[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …
Category: Education
Analyze Trends and Technologies
[Abstract] The purpose of this document is to analyze trends and technologies based upon the recommendation I made for a company to utilize a collaboration system in order to improve communications throughout their organization. The recommendation was made based upon a scenario of a company called Kucera Clothiers whose IT strategy was to improve IT …
Business Trends
[Abstract] The purpose of this document is to describe two different business trends and determine if current business trends have a positive or negative affect on the company by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy of …
Strategic Information Management in Corporate Strategy
[Abstract] The purpose of this document is to critically examine the role of information management in corporate strategy by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three …
Strategic Information Management
[Abstract] The purpose of this document is to provide a basic understanding of managing information systems by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three projects under …
Cyber Crime Offenders
[Abstract] The purpose of this document is intended to discuss motives, opportunity, and means of typical cyber offenders. Also included within this document are three different reasons of why some cyber crime offenders are prosecuted, while others are not. This document is intended for anybody looking to gain a basic understanding of why different people …
Justice System and Forensic Investigators
[Abstract] The purpose of this document is to discuss three elements of the United States justice system and how they relate to a forensics investigator. This document is intended for anybody looking to gain a basic understanding or knowledge of how the justice system applies to forensic investigators. [Content] Since the advent of the Internet …
Hashing Algorithms and CRC Uses
[Abstract] The purpose of this document is to provide a basic understanding of how hashing algorithms and cyclic redundancy checks can be used for evidence, authentication, and filtering. This document is intended for anybody looking to gain a basic understanding or knowledge of how forensic investigators find evidence to be used in a court of …
Hostile Code and Forensic Investigators
[Abstract] The purpose of this document is to identify five different examples of hostile codes and how they impact information systems. Also included within this document is an explanation of how forensic investigators should find the sources of hostile code. This document is intended for anybody looking to gain a basic knowledge or understanding of …
Areas Digital Forensic Investigators Find Evidence
[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …
Internet Protocol Security (IPsec)
Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …
Pretty Good Privacy
Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …
Digital Signature Properties
Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entail. This document is intended for anybody looking to gain a basic understanding or a …
Public-key Directory
Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …
Public-key Cryptography
Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …
Data Encryption Standard and 3DES
Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …
Link and End-to-End Encryption Techniques
Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …
Encryption Techniques
[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …
Business Continuity
[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …
Choosing a Location for a Network Operations Center (NOC)
[Abstract] The purpose of this document is to provide a basic understanding of network operation centers by identifying three key factors to consider when choosing a location for a network operation center. Also included within this document are five areas of physical security to consider when constructing a network operation center. [Content] When considering constructing …
Hardening OS X
[Abstract] The purpose of this document is to provide a basic understanding of operating systems and vulnerabilities with hardening practices for ensuring Apple’s operating system OS X is secured. Also included within this document are methods for ensuring that a web server is secured. [Content] “Every Mac is secure right out of the box,” thanks …
Disposition of Sensitive Information
[Abstract] The purpose of this document is to provide a summary of the article entitled “Disposition Of Sensitive Automated Information” as the author understands this article. Also included within this document is an explanation of how disk encryption can help to protect the information on that disk in the event it was lost or stolen. …
Financial Institutions Handle Privacy
[Abstract] The purpose of this document is to analyze why many financial institutions assess privacy as a compliance issue as opposed to a risk management issue. Included within this document are two different current regulations to help consumers protect their privacy. Also included within this document is an example of the primary causes of network …
Network Testing Programs
[Abstract] The purpose of this document is to explain different types of testing programs that can be used to identify network latency issues when planning a network upgrade. Also included within this document are naming conventions for networking devices and hosts. Lastly this document will outline and explain different types of equipment and their roles …
Networking Protocols and Models
[Abstract] The purpose of this document is to explain different networking protocols and models by explaining what is needed to upgrade a network from a bus topology to a star topology. Also included within this document is information about a network design to allow for maximum users with maximum throughput for 100Mbps to the customer’s …
Network Design Scenario
[Scenario] Schaumburg Elementary is a four-year-old, single-level building with …